Does Palo Alto support decryption with Wildcard SSL-cert?
In order to determine if a connection needs to be decrypted or not, the firewall relies on the (CN) common name configured within the certificate and compares that to the security policy. ( https://live.paloaltonetworks.com/t5/Management-Articles/SSL-Decryption-Rules-Not-Matching-FQDN/ta-p... )
The firewall does not only rely on the CM in order to decide if the connection needs to be decrypted. In most connections (everything from a browser that is not older than about 4 years) the TLS handshake client hello packet contains the Server Name Indicator extension. In this field the client specifies the required FQDN and this is also checked by the firewall. So even the server has a wildcard cert the exclusion can normally still be configured with the FQDN - if the client sends a handshake packet WITH this extension.
ok maybe i dont get it. you talking about outbound decryption, but between two internal zones?
can you tell me where is the wildcard certificate installed? on the server you which to connect to, right?
if so, this normally could be possible to decrypt if:
- you have an ca certifiacte installed and checked it under certificates as your trusted forward certificate (as vsys_remo mentioned)
- you have an adequate decprytion rule for your "outbound" connection, where "outbound" means from one zone to the other
- the server is using a protocol (no proprietary encryption) and cipher suite which is supported by your PANOS Version
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!